123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990 |
- package nebula
- import (
- "crypto/cipher"
- "encoding/binary"
- "errors"
- "github.com/flynn/noise"
- )
- type endianness interface {
- PutUint64(b []byte, v uint64)
- }
- var noiseEndianness endianness = binary.BigEndian
- type NebulaCipherState struct {
- c noise.Cipher
- //k [32]byte
- //n uint64
- }
- func NewNebulaCipherState(s *noise.CipherState) *NebulaCipherState {
- return &NebulaCipherState{c: s.Cipher()}
- }
- type cipherAEADDanger interface {
- EncryptDanger(out, ad, plaintext []byte, n uint64, nb []byte) ([]byte, error)
- DecryptDanger(out, ad, plaintext []byte, n uint64, nb []byte) ([]byte, error)
- }
- // EncryptDanger encrypts and authenticates a given payload.
- //
- // out is a destination slice to hold the output of the EncryptDanger operation.
- // - ad is additional data, which will be authenticated and appended to out, but not encrypted.
- // - plaintext is encrypted, authenticated and appended to out.
- // - n is a nonce value which must never be re-used with this key.
- // - nb is a buffer used for temporary storage in the implementation of this call, which should
- // be re-used by callers to minimize garbage collection.
- func (s *NebulaCipherState) EncryptDanger(out, ad, plaintext []byte, n uint64, nb []byte) ([]byte, error) {
- if s != nil {
- switch ce := s.c.(type) {
- case cipherAEADDanger:
- return ce.EncryptDanger(out, ad, plaintext, n, nb)
- default:
- // TODO: Is this okay now that we have made messageCounter atomic?
- // Alternative may be to split the counter space into ranges
- //if n <= s.n {
- // return nil, errors.New("CRITICAL: a duplicate counter value was used")
- //}
- //s.n = n
- nb[0] = 0
- nb[1] = 0
- nb[2] = 0
- nb[3] = 0
- noiseEndianness.PutUint64(nb[4:], n)
- out = s.c.(cipher.AEAD).Seal(out, nb, plaintext, ad)
- //l.Debugf("Encryption: outlen: %d, nonce: %d, ad: %s, plainlen %d", len(out), n, ad, len(plaintext))
- return out, nil
- }
- } else {
- return nil, errors.New("no cipher state available to encrypt")
- }
- }
- func (s *NebulaCipherState) DecryptDanger(out, ad, ciphertext []byte, n uint64, nb []byte) ([]byte, error) {
- if s != nil {
- switch ce := s.c.(type) {
- case cipherAEADDanger:
- return ce.DecryptDanger(out, ad, ciphertext, n, nb)
- default:
- nb[0] = 0
- nb[1] = 0
- nb[2] = 0
- nb[3] = 0
- noiseEndianness.PutUint64(nb[4:], n)
- return s.c.(cipher.AEAD).Open(out, nb, ciphertext, ad)
- }
- } else {
- return []byte{}, nil
- }
- }
- func (s *NebulaCipherState) Overhead() int {
- if s != nil {
- return s.c.(cipher.AEAD).Overhead()
- }
- return 0
- }
|